Articles
Latest Articles
Google Highlights an Actively-Exploited Android Vulnerability
Security flaws are vulnerabilities that come out of certain issues and contradictions in code. Bad actors can use these gaps in code to bypass security measures and take advantage of a device or network. As such, they're dangerous, and should...
November 12, 2024
Major Grocery Store Parent Company Affected in ‘Cybersecurity Issue’
When you think of businesses that are prime targets for hackers, you don't think of your local grocery. As it happens, major grocery stores in the Northeast are dealing with a cybersecurity incident. Ahold Delhize USA, which owns Stop &...
November 12, 2024
Google’s AI Discovered a Zero-Day Vulnerability
Security researchers discover zero-day vulnerabilities all the time. Zero-days are flaws that are either known or actively exploited by third-parties before the developer of the affected software has a chance to patch that vulnerability. As such, they're the most critical...
November 5, 2024
This Malware Takes Over Android Phones to Place Fake Banking Calls
A new type of malware will trick you into divulging your banking information to hackers. As reported by The Hacker News, researchers have unearthed a fresh variant of the "FakeCall" malware strain. FakeCall uses "voice phishing" to trick victims into...
November 5, 2024
Watch Out for This Microsoft Teams Phishing Scheme
Microsoft Teams is an essential component of modern work. If your business uses Microsoft 365 apps, you likely use Teams to communicate, too. While Microsoft Teams is perfectly safe to use for business communications, you must always remain vigilant. This...
October 29, 2024
QR Code Scams Are on the Rise
While not quite as ubiquitous in 2024 as they were shortly after the pandemic, QR codes offer convenient access to websites, without having to type in the address yourself. But as useful as they can be, they aren't infallible. In...
October 29, 2024
Your Smartphone Passcode Should Be Six Numbers Long (Or Longer)
Many of us open our smartphones these days with a fingerprint or a face scan. But if those fail, or we don't want to use biometric authentication, we rely on phone passcodes. While the default four-digit code is convenient to...
October 22, 2024
There Are Security Flaws With Major E2EE Cloud Storage Providers
End-to-end encryption (E2EE) is supposed to protect important files with cryptographic technology: Without the key, no one should be able to read the encrypted files. However, when there are security flaws in the process, threat actors can, theoretically, break or...
October 22, 2024
Microsoft Will Stop Supporting Windows 10 in One Year (for Free)
Windows 10 continues to be an incredibly popular OS for PC users around the world. Whether people are reluctant to relearn a new set of features and UI, or they simply enjoy the stability of using a PC with a...
October 14, 2024
Microsoft’s October Patch Tuesday Includes 118 Fixes
We've covered Microsoft's past few Patch Tuesday updates, as they've recently included some important security fixes. The company's October update is no exception, including fixes for 118 security vulnerabilities for Windows. According to The Hacker News, 113 of these flaws...
October 14, 2024